Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2024 19:15

General

  • Target

    2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe

  • Size

    333KB

  • MD5

    8dd4853010e7db531898aa198b116300

  • SHA1

    839c24033a06b4f9ff2abd065f12cbdec61d83e0

  • SHA256

    2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f

  • SHA512

    1be5cbce7454acf89b94ec27ef1f9c74c3a8ef53bb6a93dc3ca9243ef9a5d612b1400d7215a4107e95512f7f073c65e3ba7d90f735db74c990830acf0444b5f6

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9W:vHW138/iXWlK885rKlGSekcj66ciWW

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe
    "C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\qukel.exe
      "C:\Users\Admin\AppData\Local\Temp\qukel.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\akdup.exe
        "C:\Users\Admin\AppData\Local\Temp\akdup.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1860
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    6fadf302779de6a35911ec20f44eaa9c

    SHA1

    badefcb45d3e18eb9a4af1b8f9b53ba321fd4d26

    SHA256

    80beb48d4f4f11b66385e3347cb54777a8376fc918532c6def8af74f6ee9e4a0

    SHA512

    be028304116ebc759a74721b3d98f97f5948dcdd0767ad86a91e21daec21bd87407ce885c4c7e08f609d1ce89044bdbb04e6db2f1107b73bf344c74993d45001

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    e0de42debd653f5e18682743029d7fbd

    SHA1

    74017ebc3de68e8baf09a07412b6a7d49e0a9f8e

    SHA256

    665c37956e76d11941218b931f39d1558bbc2621f175d6a8a00da84a1b5310cd

    SHA512

    739fdb02e62c9dbe0e23405bff2b74c082c5de40fde38852dc82ebf1bc8e8d9516f6020c0d19d95dcd4603245d353cb61a1d598a31bca825b016419413cfee03

  • \Users\Admin\AppData\Local\Temp\akdup.exe

    Filesize

    172KB

    MD5

    497b65cfe46eb9f4b8cda4a9b6e47e1c

    SHA1

    957b011d0c595652ad1d3717571256136c2c199d

    SHA256

    32216fdd696285d72dd9d00b1e6aaaabd4271cd761e2d0f4d7156e420b742792

    SHA512

    326bab391189cd0e634befdfe7047e59129a17ee7da23d7d77cb0e2dec9baf0fcf577bb66c4f8764974775dbec2a24ad8359829d4fdbbd995790e39d883e14e1

  • \Users\Admin\AppData\Local\Temp\qukel.exe

    Filesize

    333KB

    MD5

    b4cc42c9b0b0a705072efe609e6983b7

    SHA1

    a26343ba4401d8abcfb47425dd7734f8ff427038

    SHA256

    d1361f731d0e2f7085a9c06493eba55f727b6eeae9b7dca5a723413c39ab1da8

    SHA512

    0f7985b33e161ef9b96b345d2133d175e292f055ec14b4ac32f1a0dc7f0890a9c5bc17f0f277ade623ccfdb17141c6e5b4121c9c3bb0b29aa08716982966f342

  • memory/1860-40-0x00000000002F0000-0x0000000000389000-memory.dmp

    Filesize

    612KB

  • memory/1860-49-0x00000000002F0000-0x0000000000389000-memory.dmp

    Filesize

    612KB

  • memory/1860-48-0x00000000002F0000-0x0000000000389000-memory.dmp

    Filesize

    612KB

  • memory/1860-47-0x00000000002F0000-0x0000000000389000-memory.dmp

    Filesize

    612KB

  • memory/1860-46-0x00000000002F0000-0x0000000000389000-memory.dmp

    Filesize

    612KB

  • memory/1860-45-0x00000000002F0000-0x0000000000389000-memory.dmp

    Filesize

    612KB

  • memory/1860-41-0x00000000002F0000-0x0000000000389000-memory.dmp

    Filesize

    612KB

  • memory/2136-9-0x00000000027B0000-0x0000000002831000-memory.dmp

    Filesize

    516KB

  • memory/2136-18-0x0000000000870000-0x00000000008F1000-memory.dmp

    Filesize

    516KB

  • memory/2136-0-0x0000000000870000-0x00000000008F1000-memory.dmp

    Filesize

    516KB

  • memory/2136-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2908-38-0x0000000000D50000-0x0000000000DD1000-memory.dmp

    Filesize

    516KB

  • memory/2908-23-0x0000000000D50000-0x0000000000DD1000-memory.dmp

    Filesize

    516KB

  • memory/2908-19-0x0000000000D50000-0x0000000000DD1000-memory.dmp

    Filesize

    516KB

  • memory/2908-20-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB